
Infinibyte Cloud Rules of Behavior for External Users
The following Rules of Behavior for External Users defines the acceptable use of Infinibyte information and information systems by users who do not have system-level access. The Rules of Behavior use the term sensitive information to refer to personally identifiable information (PII), protected health information (PHI), controlled unclassified information (CUI), proprietary data, etc. This policy does not supersede any other applicable law or higher-level agency directive.
The Infinibyte Cloud Information System Security Officer (ISSO) or representative is responsible for the development and management of this policy. Questions, comments, suggestions, and requests for information about this policy should be directed to the Infinibyte Cloud Service Desk by submitting a request at support@infinibytecloud.com or by calling (301) 628-3500.
•
You
must process only data that pertains to official business and is authorized
to be processed on the system.
•
Your
level of access to Infinibyte Cloud systems is limited to ensure your access
is no more than necessary to perform your legitimate tasks or assigned
duties. If you believe you are
being granted access that you should not have, you must immediately notify
the Infinibyte Cloud Service Desk.
•
You
must use only the data for which you have been granted authorization.
•
You
must ensure that access is assigned based on the Infinibyte Cloud system
owner’s approval.
•
You
must ensure that access to sensitive data is based on your job function.
•
You
must notify the Infinibyte Cloud system owner if access to system resources
is beyond that which is required to perform your job.
•
You
must notify the Infinibyte Cloud system owner when you no longer have a
legitimate need to access an Infinibyte Cloud system, so that your access is
revoked.
•
You
must not browse, search, or reveal sensitive information except in
accordance with that which is required to perform your legitimate tasks or
assigned duties, or without express written permission of an Infinibyte
Cloud system owner.
•
You
must ensure that sensitive information entered into systems is restricted to
team members on a need-to-know basis.
•
You
must not retrieve information, or in any other way disclose information, for
someone who does not have authority to access that information.
•
You
must not post Infinibyte Cloud or customer information to external newsgroups, social media and/or other types of third-party website applications, or other public forums without authority.
•
You
must not use DLH-provided identifiers (e.g., email addresses) and authentication secrets (e.g., passwords) to create accounts on external sites/applications including social media, third-party websites or other public forums.
•
You
must not process U.S. classified national security information on any system
in Infinibyte Cloud for any reason.
•
You
must keep passwords, Personal Identity Verification (PIV) cards, Personal
Identification Numbers (PIN), and other access credentials confidential; an
Infinibyte Cloud employee should never ask you to reveal them.
•
You
must not use another person’s account, identity, password/passcode/PIN, or
PIV card.
•
You
must promptly change password(s) when required by Infinibyte Cloud policy
and if you suspect that it has been compromised.
•
You
must follow proper logon/logoff procedures.
You must promptly log off when session access is no longer needed.
Never leave your computer unattended while logged into the system.
•
You
must report all suspected and identified information security incidents and
privacy breaches related to Infinibyte Cloud systems to the Infinibyte Cloud
Service Desk, as soon as possible, without unreasonable delay and no later
than within one (1) hour of occurrence or discovery.
•
You
must discontinue use of any system resources that show signs of being
infected by a virus or other malware and report the suspected incident.
•
You
must comply with all applicable federal, state, and local laws and
regulations, including without limitation those related to data privacy,
international communications, and the exportation of technical or personal
data.
•
You
must familiarize yourself with any special requirements for accessing,
protecting, and utilizing data, including Privacy Act requirements,
copyright requirements, and procurement of sensitive data.
•
You
must seek guidance from the Infinibyte Cloud system owner, Infinibyte Cloud
Information System Security Officer, or Infinibyte Cloud Service Desk if you
are unclear about security and privacy policies.
•
You
understand that any person who obtains information from a computer connected
to the Internet in violation of his or her employer’s computer-use
restrictions is in violation of the Computer Fraud and Abuse Act.